These slides—based on the research webinar from leading IT research firm EMA and Pluribus Networks—dive into how software defined packet brokers can close the visibility gap on your network.
These slides based on the webinar provide key results from the EMA “Advanced Network Analytics: Applying Machine Learning and More to Network Engineering and Operations” research report.
Topics covered include technology strategies, data collection priorities, organizational benefits, and challenges of cutting edge network analytics strategies.
Sunku Rangarnath on service providers miss to implement complete service assurance solutions that encompasses its 3 elements of monitor, report & provision the infrastructure. Service Assurance requires deeper tracking of infrastructure & service metrics, automated intervention of threshold violations using trend analysis against configured parameters & finally configuring the hardware resources & service levels based on service priority.
This talk presents range of closed loop platform automation domains focusing on the real-time and near-real-time loops touching the platform. We discuss the integration of Infrastructure telemetry, analytics, policy management interfaces & introduce the concept of Node Agent, using a noisy neighbor demo, for VM/container orchestrators to achieve intervention free Closed Loop Automation based service assurance solutions.
These slides based on the research webinar hosted by leading IT analyst firm EMA provides results of research on artificial intelligence and machine learning and their impact on DevOps, workload automation, and event and incident management.
AIOps: Anomalies Detection of Distributed TracesJorge Cardoso
Introduction to the field of AIOps. large-scale monitoring, and observability. Provides an example illustrating how Deep Learning can be used to analyze distributed traces to reveal exactly which component is causing a problem in microservice applications.
Presentation given at the National University of Ireland, Galway (NUI Galway)
on 2019.08.20.
Thanks to Prof. John Breslin
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure. Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Now today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges. In this presentation you will get a better understanding of:
What is Artificial Intelligence for IT Operations
What are the required technologies for success at AIOps
What challenges exist for achieving AIOPs
These slides based on the webinar provide key results from the EMA “Advanced Network Analytics: Applying Machine Learning and More to Network Engineering and Operations” research report.
Topics covered include technology strategies, data collection priorities, organizational benefits, and challenges of cutting edge network analytics strategies.
Sunku Rangarnath on service providers miss to implement complete service assurance solutions that encompasses its 3 elements of monitor, report & provision the infrastructure. Service Assurance requires deeper tracking of infrastructure & service metrics, automated intervention of threshold violations using trend analysis against configured parameters & finally configuring the hardware resources & service levels based on service priority.
This talk presents range of closed loop platform automation domains focusing on the real-time and near-real-time loops touching the platform. We discuss the integration of Infrastructure telemetry, analytics, policy management interfaces & introduce the concept of Node Agent, using a noisy neighbor demo, for VM/container orchestrators to achieve intervention free Closed Loop Automation based service assurance solutions.
These slides based on the research webinar hosted by leading IT analyst firm EMA provides results of research on artificial intelligence and machine learning and their impact on DevOps, workload automation, and event and incident management.
AIOps: Anomalies Detection of Distributed TracesJorge Cardoso
Introduction to the field of AIOps. large-scale monitoring, and observability. Provides an example illustrating how Deep Learning can be used to analyze distributed traces to reveal exactly which component is causing a problem in microservice applications.
Presentation given at the National University of Ireland, Galway (NUI Galway)
on 2019.08.20.
Thanks to Prof. John Breslin
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure. Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Now today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges. In this presentation you will get a better understanding of:
What is Artificial Intelligence for IT Operations
What are the required technologies for success at AIOps
What challenges exist for achieving AIOPs
These research slides—based on the webinar from leading IT research firm Enterprise Management Associates—highlight the essential findings of EM’s research on application delivery infrastructure. The insights provided are based on a survey of 253 subject matter experts from enterprises and cloud providers.
IT Operation Management Automation Roadmap post PandemicManasKumarLenka1
Captures a roadmap as to how Post Pandemic, Organizations Like CGI can in grow in ITOM automation space considering they have existing IP and experience IN RPA , BPM space
DEJ's AIOps research study titled - Strategies of Top Performing Organizations in Deploying AIOps is based on insights from 1,100+ organizations (721 of them using AIOps capabilities).
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready EnterpriseDell World
It’s time to re-architect your legacy environment in order to lay the foundation for an adaptive enterprise. In this session, you'll learn how to increase your business and technical agility using a fit-to-purpose .NET or Java architecture, while deploying your apps intelligently in the cloud and integrating with your complex IT environment, customers and partners.
Leveraging research findings from EMA's 2012 "Big Data Comes of Age" Research Report, this new Infographic outlines the five business requirements driving Big Data solutions and the technologies that support those requirements.
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)Jon Stevens-Hall
A look at some of the disruptive enterprise IT trends which will change Software Asset Management over the upcoming years.
References:
S5: PWC Global 100 Software Leaders: The growing importance of apps and services
http://www.pwc.com/en_GX/gx/technology/publications/global-software-100-leaders/assets/pwc-global-100-software-leaders-2014.pdf
S6: IDC Worldwide SaaS Enterprise Applications 2014-2018 Forecast and 2013 Vendor Shares
http://www.idc.com/getdoc.jsp?containerId=252568
S7: SkyHigh Networks Cloud Adoption and Risk Reports (1-7)
https://www.skyhighnetworks.com/cloud-report/
S8: BSA: NAVIGATING THE CLOUD: Why Software Asset Management Is More Important Than Ever
http://portal.bsa.org/samcloud/bsasamcloud.pdf
S12: “Your Cloud Future Is Here - How IT Can Embrace The Business Demand For Cloud And Exceed Expectations” Forrester, June 2013
http://documents.bmc.com/products/documents/35/77/443577/443577.pdf
S15: CIO.com: 5 Misconceptions of Cloud Software and Virtual Licensing
http://www.cio.com/article/2387027/cloud-computing/5-misconceptions-of-cloud-software-and-virtual-licensing.html
S18: Announcing Amazon Elastic Compute Cloud (EC2) - 24th August 2006
http://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/
Licensing Oracle Software in the Cloud Computing Environment (c.2008)
https://web.archive.org/web/20100311022227/http://www.oracle.com/corporate/pricing/cloud-licensing.pdf
S21: Steve Balmer Youtube video, uploaded 5th October 2009
https://www.youtube.com/watch?v=NIN4g8cB_xg
S24: Docker 1.0 brings container technology to the enterprise (ZDNet, 9th June 2014)
http://www.zdnet.com/article/docker-1-0-brings-container-technology-to-the-enterprise/
S25: Docker Hub registry image (unofficial) for Oracle Enterprise Edition
https://registry.hub.docker.com/u/filemon/oracle_11g/
S26: Docker Hub registry image for IBM MQ Advanced
https://registry.hub.docker.com/u/ibmimages/mqadvanced/
S29: Gartner Predicts 2015: The Internet of Things (via ZDNet article, 27th January 2015)
http://www.zdnet.com/article/gartner-predicts-a-quarter-billion-connected-vehicles-by-2020/
S31: Oracle Software Investment Guide
S32: Steve Banker: The Intelligent Forklift in the Age of the Industrial Internet of Things (Forbes, 3rd March 2015)
http://www.forbes.com/sites/stevebanker/2015/03/16/the-intelligent-forklift-in-the-age-of-the-industrial-internet-of-things
S33: Gartner: Software Licensing and Entitlement Management Is the Key to Monetizing the IoT (Apr 2014)
http://www.gartner.com/newsroom/id/2700017
S34: The 3rd Industrial Revolution. Intelligent Devices, Software and the IoTs. IDC/Flexera
via http://learn.flexerasoftware.com/SWM-WP-IDM-AUM-Third-Industrial-Revolution
RightScale State of the Cloud 2015: http://assets.rightscale.com/uploads/pdfs/RightScale-2015-State-of-the-Cloud-Report.pdf
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...Iver Band
As the Vice President, Datacenter Architecture at Presidio,
William Turner, PhD has more than 20 years of hand-son,
full-project-cycle experience in strategizing, designing and
deploying large-scale Fortune 500 networks and security
solutions. His extensive background in banking, security,
and government has yielded several well regarded industry
standards and noted reference models.
Dr. Turner envisions and drives a future in which sophisticated software provisions and de-provisions IT infrastructure automatically in response to business needs. The specialized appliances enterprises traditionally rely upon will be replaced by industry-standard hardware playing necessary roles on demand.
EAPJ conducted this interview from the perspective of an infrastructure architect considering a software-defined future for the networking, hosting and storage underlying a
major upcoming application investment.
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
With the mass transition to at-home workers, customers are forced to quickly adjust or even overhaul their network policies and technology to prepare. With many remote staff that will likely continue to stay working at home, how do you talk about the short and long term network strategy?
Deloitte Software As A Service Deloitte SeminarTheo Slaats
Presentation of Theo Slaats, partner at Deloitte, on "Software as a Service" during a seminar of Deloitte and Oracle on October 8, 2008 in Amsterdam.
Proactive Services Through Insights and IoT by M. CaponeCapgemini
Measurable Business Cases for IoT in the Value Chain
IoT is changing the relationship between the customer and the company and enabling companies to develop new business models, but there are also many valuable applications
for IoT in the value chain, which can have immediate and measurable impacts on the bottom line. Capgemini shows the measurable use cases for IoT in the supply chain, product
development, production, logistics, and service.
Speaker:
Michael Capone,
Principal Business Analyst, Digital Customer Experience, Capgemini
DevOps took us from SysAdmins to DeployAdmins to improve availability but came with a tidal wave of tools and environments, leaving detecting anomalies and finding root cause a task for the overcrowded war-room of siloed experts.
Developers need to understand infrastructure, and operations needs to understand the SDLC.
The good news is AIOps can help!
Let’s look at what AIOps can realistically do for us, identify criteria for where to automate and lay out the stepping stones for achieving AIOps.
Factors affecting the adoption of cloud computing
Lorraine Morgan, Lero, National University of Ireland Galway
-session 6-
International conference on
“DATA, DIGITAL BUSINESS MODELS, CLOUD COMPUTING AND ORGANIZATIONAL DESIGN”
24-25 November 2014,
Université Paris–Sud
According to leading IT research firm Enterprise Management Associates (EMA), 75% of enterprises have observed increased collaboration between network operations and security operations teams in recent years, but only 39% of organizations believe this collaboration is completely successful. EMA describes this increased convergence of networking and security as NetSecOps.
Check out these slides to learn more about:
- Why and how NetOps and SecOps teams need to work together
- Why these partnerships often fail
- How network automation can enable this collaboration, including the types of tools that can help and the use cases that are most essential
- Real-world examples from the trenches about how these teams have come together successfully
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
These research slides—based on the webinar from leading IT research firm Enterprise Management Associates—highlight the essential findings of EM’s research on application delivery infrastructure. The insights provided are based on a survey of 253 subject matter experts from enterprises and cloud providers.
IT Operation Management Automation Roadmap post PandemicManasKumarLenka1
Captures a roadmap as to how Post Pandemic, Organizations Like CGI can in grow in ITOM automation space considering they have existing IP and experience IN RPA , BPM space
DEJ's AIOps research study titled - Strategies of Top Performing Organizations in Deploying AIOps is based on insights from 1,100+ organizations (721 of them using AIOps capabilities).
Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready EnterpriseDell World
It’s time to re-architect your legacy environment in order to lay the foundation for an adaptive enterprise. In this session, you'll learn how to increase your business and technical agility using a fit-to-purpose .NET or Java architecture, while deploying your apps intelligently in the cloud and integrating with your complex IT environment, customers and partners.
Leveraging research findings from EMA's 2012 "Big Data Comes of Age" Research Report, this new Infographic outlines the five business requirements driving Big Data solutions and the technologies that support those requirements.
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)Jon Stevens-Hall
A look at some of the disruptive enterprise IT trends which will change Software Asset Management over the upcoming years.
References:
S5: PWC Global 100 Software Leaders: The growing importance of apps and services
http://www.pwc.com/en_GX/gx/technology/publications/global-software-100-leaders/assets/pwc-global-100-software-leaders-2014.pdf
S6: IDC Worldwide SaaS Enterprise Applications 2014-2018 Forecast and 2013 Vendor Shares
http://www.idc.com/getdoc.jsp?containerId=252568
S7: SkyHigh Networks Cloud Adoption and Risk Reports (1-7)
https://www.skyhighnetworks.com/cloud-report/
S8: BSA: NAVIGATING THE CLOUD: Why Software Asset Management Is More Important Than Ever
http://portal.bsa.org/samcloud/bsasamcloud.pdf
S12: “Your Cloud Future Is Here - How IT Can Embrace The Business Demand For Cloud And Exceed Expectations” Forrester, June 2013
http://documents.bmc.com/products/documents/35/77/443577/443577.pdf
S15: CIO.com: 5 Misconceptions of Cloud Software and Virtual Licensing
http://www.cio.com/article/2387027/cloud-computing/5-misconceptions-of-cloud-software-and-virtual-licensing.html
S18: Announcing Amazon Elastic Compute Cloud (EC2) - 24th August 2006
http://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/
Licensing Oracle Software in the Cloud Computing Environment (c.2008)
https://web.archive.org/web/20100311022227/http://www.oracle.com/corporate/pricing/cloud-licensing.pdf
S21: Steve Balmer Youtube video, uploaded 5th October 2009
https://www.youtube.com/watch?v=NIN4g8cB_xg
S24: Docker 1.0 brings container technology to the enterprise (ZDNet, 9th June 2014)
http://www.zdnet.com/article/docker-1-0-brings-container-technology-to-the-enterprise/
S25: Docker Hub registry image (unofficial) for Oracle Enterprise Edition
https://registry.hub.docker.com/u/filemon/oracle_11g/
S26: Docker Hub registry image for IBM MQ Advanced
https://registry.hub.docker.com/u/ibmimages/mqadvanced/
S29: Gartner Predicts 2015: The Internet of Things (via ZDNet article, 27th January 2015)
http://www.zdnet.com/article/gartner-predicts-a-quarter-billion-connected-vehicles-by-2020/
S31: Oracle Software Investment Guide
S32: Steve Banker: The Intelligent Forklift in the Age of the Industrial Internet of Things (Forbes, 3rd March 2015)
http://www.forbes.com/sites/stevebanker/2015/03/16/the-intelligent-forklift-in-the-age-of-the-industrial-internet-of-things
S33: Gartner: Software Licensing and Entitlement Management Is the Key to Monetizing the IoT (Apr 2014)
http://www.gartner.com/newsroom/id/2700017
S34: The 3rd Industrial Revolution. Intelligent Devices, Software and the IoTs. IDC/Flexera
via http://learn.flexerasoftware.com/SWM-WP-IDM-AUM-Third-Industrial-Revolution
RightScale State of the Cloud 2015: http://assets.rightscale.com/uploads/pdfs/RightScale-2015-State-of-the-Cloud-Report.pdf
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...Iver Band
As the Vice President, Datacenter Architecture at Presidio,
William Turner, PhD has more than 20 years of hand-son,
full-project-cycle experience in strategizing, designing and
deploying large-scale Fortune 500 networks and security
solutions. His extensive background in banking, security,
and government has yielded several well regarded industry
standards and noted reference models.
Dr. Turner envisions and drives a future in which sophisticated software provisions and de-provisions IT infrastructure automatically in response to business needs. The specialized appliances enterprises traditionally rely upon will be replaced by industry-standard hardware playing necessary roles on demand.
EAPJ conducted this interview from the perspective of an infrastructure architect considering a software-defined future for the networking, hosting and storage underlying a
major upcoming application investment.
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
With the mass transition to at-home workers, customers are forced to quickly adjust or even overhaul their network policies and technology to prepare. With many remote staff that will likely continue to stay working at home, how do you talk about the short and long term network strategy?
Deloitte Software As A Service Deloitte SeminarTheo Slaats
Presentation of Theo Slaats, partner at Deloitte, on "Software as a Service" during a seminar of Deloitte and Oracle on October 8, 2008 in Amsterdam.
Proactive Services Through Insights and IoT by M. CaponeCapgemini
Measurable Business Cases for IoT in the Value Chain
IoT is changing the relationship between the customer and the company and enabling companies to develop new business models, but there are also many valuable applications
for IoT in the value chain, which can have immediate and measurable impacts on the bottom line. Capgemini shows the measurable use cases for IoT in the supply chain, product
development, production, logistics, and service.
Speaker:
Michael Capone,
Principal Business Analyst, Digital Customer Experience, Capgemini
DevOps took us from SysAdmins to DeployAdmins to improve availability but came with a tidal wave of tools and environments, leaving detecting anomalies and finding root cause a task for the overcrowded war-room of siloed experts.
Developers need to understand infrastructure, and operations needs to understand the SDLC.
The good news is AIOps can help!
Let’s look at what AIOps can realistically do for us, identify criteria for where to automate and lay out the stepping stones for achieving AIOps.
Factors affecting the adoption of cloud computing
Lorraine Morgan, Lero, National University of Ireland Galway
-session 6-
International conference on
“DATA, DIGITAL BUSINESS MODELS, CLOUD COMPUTING AND ORGANIZATIONAL DESIGN”
24-25 November 2014,
Université Paris–Sud
According to leading IT research firm Enterprise Management Associates (EMA), 75% of enterprises have observed increased collaboration between network operations and security operations teams in recent years, but only 39% of organizations believe this collaboration is completely successful. EMA describes this increased convergence of networking and security as NetSecOps.
Check out these slides to learn more about:
- Why and how NetOps and SecOps teams need to work together
- Why these partnerships often fail
- How network automation can enable this collaboration, including the types of tools that can help and the use cases that are most essential
- Real-world examples from the trenches about how these teams have come together successfully
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
These slides provides insights into EMA’s “Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise,” a new market research report that explores how companies are expanding and modernizing their visibility architectures to support hybrid cloud and multi-cloud networks.
You will learn more about:
- Why packet data remains essential to network operations and cyber security
- How companies build end-to-end visibility fabrics that capture data from the cloud and on-premises networks
- How organizations address the impact of ubiquitous traffic encryption on network visibility
- The challenges that organizations encounter when using this technology
- Best practices for success with network visibility architectures
Leading IT analyst firm Enterprise Management Associates (EMA) has published research that explores the evolution of network packet brokers (NPBs). Based on a survey of 250 network management and security decision-makers with direct involvement in their organization’s network visibility fabrics, this research examines evolving requirements, use cases, and best practices for building and using network visibility fabrics with NPBs.
These slides--based on the webinar featuring Shamus McGillicuddy, research director at EMA--provides results of this research.
For a variety of reasons, many new technologies cut off performance visibility. What can enterprises do to protect it?
These slides--based on the webinar from leading IT research firm EMA and Accedian--identify the new technologies that can undermine performance visibility and how you can adapt your monitoring tools to maintain visibility.
EMA’s market research, “Network Observability: Delivering Actionable Insights to Network Operations,” establishes a roadmap for how vendors should improve their products to deliver deep visibility and actionable insights. More importantly, this research will help IT buyers understand what network management vendors mean when they talk about network observability and how they can turn that understanding into NetOps success.
From mobility to the Internet of Things, today’s digital initiatives require a network that is high-performing, dynamic, and affordable. The IT organization must be able to scale network capacity quickly and deploy the most cutting edge network technologies in support of new initiatives.
These slides--based on the webinar hosted by leading IT analyst firm Enterprise Management Associates (EMA) and Alcatel-Lucent--highlight how enterprises are transforming their networks for the digital future and how ALE’s Network-as-a-Service (Naas) solution, including Network-on-Demand enables that transformation.
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
Despite the rapid evolution and growth of public cloud usage, enterprises are finding value in on-premises IT infrastructure. As a result, some organizations are moving their workloads back, partially or entirely, to their own data centers. In fact, according to a survey conducted by IDC, over ½ of the IT spent on servers and storage is still driven by on-prem deployments, and over 70% of those surveyed said they plan to repatriate workloads back from public cloud to an On-Prem Infrastructure.
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyThousandEyes
Organizations are using multiple IaaS and SaaS providers today, yet traditional ITOps processes and tools are straining to cope with a vast new scope of challenges and risks. Recent research by Enterprise Management Associates (EMA) shows that 74% of enterprise network teams had incumbent network monitoring tools failing to address cloud requirements. As IT business leaders responsible for delivering services in this new ecosystem, how do you equip yourself with the right visibility?
Shamus McGillicuddy, Research Director for EMA’s network management practice, and Archana Kesavan, Director of Product Marketing at ThousandEyes dive deep into the challenges of multi-cloud and how to rethink your monitoring strategy and operational delivery processes.
Uncover:
Five common IT operational challenges of multi-cloud identified in recent EMA research
The risks of not evolving ITOps for a managed cloud environment
Four monitoring best practices for a cloud-centric IT Operation
In this new digital era, enterprises need a next-generation packet broker that can deliver the right data to the right service assurance and security tools.
These slides--based on the webinar from leading IT research firm Enterprise Management Associates (EMA) and APCON--provide an overview of the technologies, features, and horsepower that enterprises should be looking for in a new network packet broker.
Whether you are new to network packet brokers or looking to refresh your existing investment, this event will offer valuable advice.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
The typical network operations teams use four to 15 tools to manage and monitor infrastructure. This fractured approach to operations often leads to inefficiencies and errors. With Cisco Prime exiting the industry, network managers should look for ways to consolidate and optimize their entire toolset.
Check out these slides from EMA Research and OpenText to discover:
- Why you need to take a new approach to network tools
- Insights from your network management peers who are planning a Cisco Prime replacement
- What features and functionality you should look for in your next network management solution
Too many network managers are fighting losing battles. Since 2016, the number of enterprise NetOps teams that are fully successful has dropped from 49% to 27%, according to Enterprise Management Associates (EMA) research.
These slides discuss why NetOps teams are failing and how a monitoring solution with a service-centric view of the network can turn things around.
These slides - based on the Webinar and featuring EMA Vice President of Research, Jim Frey, and Ixia Senior Director, Product Management, Scott Register – cover:
•Key goals and objectives of a visibility architecture
•Ways in which Network Visibility Controllers (NVCs) are being used, both today and in the future
•NVC features and capabilities having the broadest impact and delivering the most value
•Architectural and administrative qualities that are making the most difference
•Impact of server and network virtualization technologies on technology and product choices
Artificial Intelligence for IT Operations (AIOps) is the concept of using big data analytics, machine learning, and other advanced technologies to enhance IT operations.
Research from leading IT analyst firm EMA has found that enterprises are applying AIOps solutions to network infrastructure today to enhance service assurance and automation.
These slides from the webinar featuring EMA Research and VeloCloud, now part of VMware, explore how research enterprises are driving toward self-healing networks with AIOps solutions and transforming network operations.
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...FINOS
Technology leaders (CTO, VP Infrastructure, etc.) at most organisations are always looking for better and more efficient ways to address business needs. Performance is one of the critical attributes leaders consider while making data center infrastructure decisions, but with limited budgets, cost efficiency becomes an important criteria as well. This talk will discuss both CapEx and OpEx advantages of open networking, combined with technical benefits that lead to easier automation, scaling and troubleshooting.
Discover the latest insights and trends shaping the landscape of workload automation and orchestration, featuring highlights from the latest "EMA Radar™ Report for Workload Automation and Orchestration."
You will learn more about:
- Workflow Orchestration - Uncover the evolving role of orchestration in simplifying complex workflows in the era of digital transformation.
- Data Pipeline Orchestration – Learn more about WLA support for DataOps, including the integration of Apache Airflow.
- Mainframe Modernization - Gain a deeper understanding of how organizations are embracing modernization while still leveraging their mainframe investments.
- DevOps Support and Collaboration - Explore the pivotal role of workload automation in DevOps practices.
EMA Research Director Valerie O’Connell provides insights into the current, practical, and desired states of incident response and management, including:
- The roles of AI and automation in incident management
- Practical use cases for gen AI
- Business metrics and results
- Near-term investments and anticipated changes
- How organizations are changing to exploit technology advances
These slides from Enterprise Management Associates (EMA) present a wealth of research data from EMA’s recent study of real-world adoption patterns, challenges, trends, and enterprise-priorities related to infrastructure and application observability.
According to new EMA research, 84% of enterprises are seeing increased collaboration between their network and security teams. This NetSecOps convergence allows these teams to support new technologies, such as hybrid, multi-cloud architecture, and secure access service edge (SASE).
These slides from EMA Vice President of Research, Shamus McGillicuddy, provide highlights from his market research report, “NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future.”
Check out these slides to discover:
- What causes network and security team collaborations to fail
- How network data, especially packets and DNS logs, play a critical role in partnerships between
- Why network automation and network monitoring tools are critical to collaboration
- How SASE and multi-cloud are impacting collaboration
These slides discuss how to improve user experiences, boost IT efficiency, and drive business growth with modern ITSM.
The slides also dive into:
- Global forces—positive and adverse—impacting midsize organizations
- Top challenges to delivering high-quality services and effective strategies to overcome them
- The research-based case for ITSM modernization and practical ways to get started
Based on the IT Executive Survey 2023 fielded by leading IT analyst research firm EMA and global analytics software firm FICO, these slides explore key trends and opportunities shaping the technology landscape in the global banking, finance, and insurance industries. It will also examine how technology executives are aligning with their business counterparts to drive strategic outcomes.
You will also learn more about:
- Top technology-related priorities for banks and insurers, along with strategies to address significant challenges.
- Changing technology buying behavior and considerations for selecting new technology solutions.
- Strategies for maximizing the value of data and AI investments within enterprises.
- The benefits of a unified platform approach and its impact on other initiatives, such as cloud adoption and legacy modernization.
In a landscape where data is king, master data management (MDM) plays a pivotal role in ensuring data quality and consistency across organizations. Enterprise Management Associates (EMA) research shows that 96% of enterprises have one or more MDM tools or are planning to add one in the next 24 months. Achieving a successful MDM implementation, however, proves challenging for many, with 30% of organizations failing on their first attempt to deploy an MDM. Implementation teams struggle with data quality, data mapping and transformation, integration complexity, and many other challenges. What is the secret to a successful MDM implementation?
Check out these slides from EMA and Semarchy to find out!
The days of traditional passwords are numbered!
To help bring clarity to the rapidly evolving authentication landscape, Enterprise Management Associates (EMA) conducted primary research into business and end user requirements, perceptions, and outcomes in the usage of password and passwordless authentication technologies. The results present a clear snapshot of where the identity management market is today and the direction it is heading.
Get the results when you download these slides. Topics to be covered include:
- The greatest security risks posed by the continued use of passwords
- The types of authentication technologies users prefer to use as both employees and consumers
- How to reduce time, efforts, and costs associated with managing user identities
- And, much more!
These research slides provide insights into the critical issues involved in handling application- and infrastructure-complexity in ever-changing hybrid multi-cloud settings. Torsten Volk, Managing Research Director at EMA, and Jasper Paul, a Principal Product Manager at ManageEngine Site24x7, explore:
The Anatomy of Complexity: Understand and escape the complexity trap of distributed cloud native applications.
Monitoring and Metrics: Examine approaches for effective monitoring of resource utilization and performance as key components of complexity management.
AIOps: Examine the capabilities of AIOps.
FinOps Strategies: Explore frameworks and best practices for efficiently managing your cloud's financial operations without compromising on performance, resilience, or security.
Case Studies: Gain insights from real-world instances where companies have successfully mitigated the complexities and risks associated with distributed microservices architectures.
No matter what your current level of cybersecurity knowledge is, these slides created by EMA Research and A10 Networks will provide valuable insights into the latest trends and empower you with the best practices in cloud and web application security.
Download to learn more about:
- The top threats that pose a risk to your organization and how to mitigate them
- The difference between buzz and hype in today’s security approaches, and how this can be used to help your organization
- A discussion of Zero Trust, web application security, DDoS protection, encryption, and more for the hybrid cloud world
These research slides from EMA Managing Research Director Torsten Volk provide you with insights into EMA’s Kubernetes research. Based on the perspective of application developers, platform engineers, and security and IT operations professionals, this research delivers insights into the real-world adoption patterns, challenges, trends, and enterprise priorities related to the Kubernetes container platform.
Download and learn more about:
Challenges and Solutions – The top issues developers, IT operations, and security teams face and how to solve them.
Real-Life Insights – From cost pitfalls to maximizing developer productivity, this research sheds light on what IT professionals face and delivers actionable insights into these issues.
Security Vulnerabilities – The core types of security vulnerabilities and how to mitigate them.
Community Priorities – What the Kubernetes community is working on.
Global Trends – Adoption patterns of Kubernetes worldwide.
Enterprise Management Associates (EMA) has published the most comprehensive market research study on DDI solutions in over a decade, “DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era.” Based on a survey of 333 enterprise DDI experts, this research found that less than 40% of enterprises are fully successful in their approach to DDI technology.
These slides created by Shamus McGillicuddy, EMA vice president of research, provide insights into the following:
- Why only 31% of enterprise are confident in the security of their DNS infrastructure
- How DDI enables network automation
- How cloud migration disrupts DDI strategy and what you can do about it
- What to look for in an ideal DDI product
By the end of 2023, 83% of enterprises expect to connect operational technology (OT) and IoT devices to their enterprise networks, according to Enterprise Management Associates (EMA) research. IT and OT are converging so that enterprises can analyze OT data, innovate, and optimize industrial systems. A new approach to OT security is required.
Enterprises need to modernize network architecture to protect these critical assets, especially by updating their network security and modernizing their approach to network segmentation.
These slides explore how enterprises can use OT-dedicated firewalls and zero trust network access to protect OT systems from malicious actors.
Despite claims that the rise of cloud cuts the relevance of CMDB, Enterprise Management Associates (EMA) experience and field research consistently find the opposite to be true. In a recent EMA research study, a panel of global IT leaders stated that CMDB use was central to major functions. For many of those respondents, CMDB use was viewed as increasing in importance for automation of complex processes.
Where is the disconnect?
Check out these slides from EMA's Research Director, Valerie O’Connell, to get insights into the research findings, including:
- CMDB use is increasing for 64% of organizations
- Hybrid organizations have the highest rate of CMDB use increase
- 24% update the CMDB in real time. Is that the right frequency?
- Why CMDB has an uneven reputation
- Success rates, reasons, and returns
For all its benefits, remote work puts tremendous pressure on network infrastructure and operations teams, who must maximize network experience while maintaining security. Enterprise Management Associates (EMA) explores this issue in depth with its market research report, “Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work,” based on a survey of 354 IT professionals.
Get insights when you check out these research slides.
As security leaders evaluate the vast array of tools available to combat ransomware attacks, endpoint and extended detection and response solutions still stand out as the best defense against emerging threats. How can an enterprise know which of these tools is the best though?
Enterprise Management Associates (EMA) surveyed IT professionals, information security practitioners, and technology business leaders across all verticals to discover their attitudes and perspectives toward XDR solutions. The primary goal was to use survey responses and third-party interviews to create a comprehensive definition of “What is XDR?” for leaders to use as part of their solution evaluation process.
Check out these research slides featuring Christopher Steffen, CISSP, CISA, and vice president of research at EMA, to discover the definition and get results from this research.
Enterprise Management Associates (EMA) research reveals that companies are more successful with SD-WAN transformation when they consume the technology as a managed service. How can an IT organization know if it is choosing the right managed service, though?
Check out these slides to discover the five things you need to know about the power of a managed SD-WAN solution. You will also learn more about:
- Why so many enterprises are choosing managed SD-WAN over DIY deployments
- What to look for in an SD-WAN provider
- Tips for optimizing Day 2 operations with managed SD-WAN
- Charting a path to the future, including secure access service edge
With users working remotely and data now housed in multiple cloud applications, securing access to data is essential to a modern digital infrastructure. The rise of hybrid work has challenged the scalability of traditional VPNs, and hybrid multi-cloud architectures have made legacy centralized VPN concentrators impractical.
Zero trust network access (ZTNA) is an emerging class of technology that addresses these new remote access requirements and challenges.
Check out these slides to discover why it’s time to transition from legacy VPNs to ZTNA solutions. You will also learn more about:
- Why legacy VPN technologies cannot address the needs of modern enterprises
- How ZTNA helps secure remote access in the era of hybrid work and multi-cloud architectures
- The best way to transition to a next-generation solution
Enterprises have been trying to automate their networks for decades, but manual tasks continue to dominate operations. According to Enterprise Management Associates (EMA) research, only 34% of IT organizations have been able to automate more than half of their network provisioning and change management tasks. With so many commercial and open source network automation tools available, why aren’t organizations doing better?
These slides—based on the webinar featuring Shamus McGillicuddy (EMA Vice President of Research) and Jason Edelman (Founder and CTO of network automation solution provider Network to Code) —provide guidance on how to set a network automation strategy. You will also get insights on:
- Whether a network team should use open source, homegrown, or commercial network automation solutions
- How to establish a data-driven source of truth for your network
- How to build the right team for enabling your network automation strategy
EMA’s market research report, “From Scheduler to Automation Fabric for the Enterprise: Workload Automation Transformation in 2023” is based on a survey of 406 global IT and business users and decision-makers who have direct experience with workload automation. Overall, 89% of them believe workload automation tools should be expanded to orchestrate automation tools across the enterprise. Get other insights when you check out these slides.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
Democratize Observability with Software Defined Packet Brokers
1. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Democratize Observability with
Software-Defined Packet Brokers
Shamus McGillicuddy
VP of Research, Network Management
Enterprise Management Associates (EMA)
Alessandro Barbieri
VP Product Management
Pluribus Networks
2. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
Slide 2
• Democratize Observability with Software Defined Packet Brokers
On-Demand Webinar: https://info.enterprisemanagement.com/democratize-
observability-with-software-defined-packet-brokers-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch